[go: up one dir, main page]

GB2589877B - An apparatus and method of controlling access to data stored in a non-trusted memory - Google Patents

An apparatus and method of controlling access to data stored in a non-trusted memory Download PDF

Info

Publication number
GB2589877B
GB2589877B GB1918126.2A GB201918126A GB2589877B GB 2589877 B GB2589877 B GB 2589877B GB 201918126 A GB201918126 A GB 201918126A GB 2589877 B GB2589877 B GB 2589877B
Authority
GB
United Kingdom
Prior art keywords
data stored
controlling access
trusted memory
trusted
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1918126.2A
Other versions
GB2589877A (en
GB201918126D0 (en
Inventor
Montaner Mas Hector
Lars Sandberg Andreas
Avanzi Roberto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ARM Ltd
Original Assignee
ARM Ltd
Advanced Risc Machines Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ARM Ltd, Advanced Risc Machines Ltd filed Critical ARM Ltd
Priority to GB1918126.2A priority Critical patent/GB2589877B/en
Publication of GB201918126D0 publication Critical patent/GB201918126D0/en
Priority to US17/756,877 priority patent/US12248409B2/en
Priority to KR1020227022984A priority patent/KR20220108152A/en
Priority to PCT/GB2020/052882 priority patent/WO2021116655A1/en
Priority to CN202080085327.7A priority patent/CN114761957A/en
Publication of GB2589877A publication Critical patent/GB2589877A/en
Application granted granted Critical
Publication of GB2589877B publication Critical patent/GB2589877B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • G06F12/0866Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches for peripheral storage systems, e.g. disk cache
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • G06F12/1425Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
    • G06F12/1441Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
GB1918126.2A 2019-12-10 2019-12-10 An apparatus and method of controlling access to data stored in a non-trusted memory Active GB2589877B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
GB1918126.2A GB2589877B (en) 2019-12-10 2019-12-10 An apparatus and method of controlling access to data stored in a non-trusted memory
US17/756,877 US12248409B2 (en) 2019-12-10 2020-11-12 Apparatus and method of controlling access to data stored in a non-trusted memory
KR1020227022984A KR20220108152A (en) 2019-12-10 2020-11-12 Apparatus and method for controlling access to data stored in untrusted memory
PCT/GB2020/052882 WO2021116655A1 (en) 2019-12-10 2020-11-12 An apparatus and method of controlling access to data stored in a non-trusted memory
CN202080085327.7A CN114761957A (en) 2019-12-10 2020-11-12 Apparatus and method for controlling access to data stored in untrusted memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1918126.2A GB2589877B (en) 2019-12-10 2019-12-10 An apparatus and method of controlling access to data stored in a non-trusted memory

Publications (3)

Publication Number Publication Date
GB201918126D0 GB201918126D0 (en) 2020-01-22
GB2589877A GB2589877A (en) 2021-06-16
GB2589877B true GB2589877B (en) 2022-01-12

Family

ID=69172008

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1918126.2A Active GB2589877B (en) 2019-12-10 2019-12-10 An apparatus and method of controlling access to data stored in a non-trusted memory

Country Status (5)

Country Link
US (1) US12248409B2 (en)
KR (1) KR20220108152A (en)
CN (1) CN114761957A (en)
GB (1) GB2589877B (en)
WO (1) WO2021116655A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2616049A (en) * 2022-02-25 2023-08-30 Toshiba Kk Authentication method and system, a quantum communication network, and a node for quantum communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060123250A1 (en) * 1999-07-16 2006-06-08 Intertrust Technologies Corporation Trusted storage systems and methods
US20080172562A1 (en) * 2007-01-12 2008-07-17 Christian Cachin Encryption and authentication of data and for decryption and verification of authenticity of data
US20140380124A1 (en) * 2011-11-01 2014-12-25 Cleversafe, Inc. Acquiring a trusted set of encoded data slices
US20170147356A1 (en) * 2014-04-28 2017-05-25 Intel Corporation Securely booting a computing device
US20170289151A1 (en) * 2016-03-29 2017-10-05 Mark W. Shanahan Technologies for dynamic loading of integrity protected modules into secure enclaves

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010019916A1 (en) * 2008-08-14 2010-02-18 The Trustees Of Princeton University Hardware trust anchors in sp-enabled processors
US9336410B2 (en) * 2009-12-15 2016-05-10 Micron Technology, Inc. Nonvolatile memory internal signature generation
JP6788610B2 (en) * 2015-04-30 2020-11-25 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Cryptographic device for calculating block cyphers
US11169934B2 (en) * 2018-06-28 2021-11-09 Intel Corporation Systems, methods and apparatus for low latency memory integrity mac for trust domain extensions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060123250A1 (en) * 1999-07-16 2006-06-08 Intertrust Technologies Corporation Trusted storage systems and methods
US20080172562A1 (en) * 2007-01-12 2008-07-17 Christian Cachin Encryption and authentication of data and for decryption and verification of authenticity of data
US20140380124A1 (en) * 2011-11-01 2014-12-25 Cleversafe, Inc. Acquiring a trusted set of encoded data slices
US20170147356A1 (en) * 2014-04-28 2017-05-25 Intel Corporation Securely booting a computing device
US20170289151A1 (en) * 2016-03-29 2017-10-05 Mark W. Shanahan Technologies for dynamic loading of integrity protected modules into secure enclaves

Also Published As

Publication number Publication date
US20230113906A1 (en) 2023-04-13
GB2589877A (en) 2021-06-16
US12248409B2 (en) 2025-03-11
WO2021116655A1 (en) 2021-06-17
CN114761957A (en) 2022-07-15
KR20220108152A (en) 2022-08-02
GB201918126D0 (en) 2020-01-22

Similar Documents

Publication Publication Date Title
SG11202010940SA (en) Multi-level storage method and apparatus for blockchain data
EP3992801A4 (en) Data storage method for flash memory device and flash memory device
SG11202009089SA (en) Method and apparatus for controlling data access right
PL3614270T3 (en) Apparatus and method for memory management in a graphics processing environment
EP3980995A4 (en) Method of programming memory device and related memory device
IL280712A (en) An apparatus and method for controlling memory accesses
EP3547248B8 (en) Method and system for controlling write processing to an external memory
GB2557366B (en) An apparatus and method for transferring data between address ranges in memory
EP4213036A4 (en) DATA STORAGE METHOD AND APPARATUS
SG11202107831WA (en) Access control method and device, and electronic device and storage medium
TWI562149B (en) Memory control circuit unit, memory storage apparatus and data accessing method
SG11202108697RA (en) Virtual object control method and apparatus, storage medium, and electronic device
TWI561981B (en) Data reading method, memory control circuit unit and memory storage apparatus
GB2540940B (en) An apparatus and method for transferring a plurality of data structures between memory and one or more vectors of data elements stored in a register bank
EP3948868A4 (en) Method of programming and verifying memory device and related memory device
EP3953807A4 (en) Data loading and storage instruction processing method and device
EP3869313A4 (en) Data storage method and apparatus
GB201814149D0 (en) System and method for providing protected data storage in a data memory
SG10202102099XA (en) Data complementing system and data complementing method
EP3953938A4 (en) Memory device capable of reducing program disturbance and erasing method thereof
GB2589877B (en) An apparatus and method of controlling access to data stored in a non-trusted memory
EP3923288A4 (en) Memory and access method
GB202001900D0 (en) Methods and apparatus for controlling access to personal data
GB201415951D0 (en) Device and method for storing data in a plurality of multi-level cell memory chips
DK3935906T3 (en) Methods and devices for specifying information in a random access method